From: zohar@linux.vnet.ibm.com (Mimi Zohar)
To: linux-security-module@vger.kernel.org
Subject: [GIT PULL] IMA patches for 4.13
Date: Wed, 21 Jun 2017 16:02:13 -0400 [thread overview]
Message-ID: <1498075333.3200.11.camel@linux.vnet.ibm.com> (raw)
Hi James,
This pull request contains a number of simple and not so simple clean
up patches, which are precursors to new features (eg. appended
signature support, TPM crypto agile templates), and other minor bug
fixes.
thanks,
Mimi
----
The following changes since commit cdac74ddf28e2f07319cc89446f9dea35d22d999:
Merge branch 'smack-for-4.13' of git://github.com/cschaufler/smack-next into next (2017-06-21 11:30:20 +1000)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next
for you to fetch changes up to fc26bd50539b6f52aa75ffbaec7b083825ec5451:
IMA: update IMA policy documentation to include pcr= option (2017-06-21 14:37:12 -0400)
----------------------------------------------------------------
Ben Hutchings (1):
IMA: Correct Kconfig dependencies for hash selection
Eric Richter (1):
IMA: update IMA policy documentation to include pcr= option
Geliang Tang (1):
ima: use memdup_user_nul
Laura Abbott (1):
ima: Add cgroups2 to the defaults list
Mimi Zohar (4):
ima: extend the "ima_policy" boot command line to support multiple policies
ima: define a set of appraisal rules requiring file signatures
ima: define Kconfig IMA_APPRAISE_BOOTPARAM option
ima: define is_ima_appraise_enabled()
Roberto Sassu (4):
ima: introduce ima_parse_buf()
ima: use ima_parse_buf() to parse measurements headers
ima: use ima_parse_buf() to parse template data
ima: fix get_binary_runtime_size()
Thiago Jung Bauermann (3):
integrity: Small code improvements
ima: Simplify policy_func_show.
ima: Log the same audit cause whenever a file has no signature
Tycho Andersen (1):
ima: fix up #endif comments
Documentation/ABI/testing/ima_policy | 8 +-
Documentation/admin-guide/kernel-parameters.txt | 21 ++--
include/linux/ima.h | 6 ++
security/integrity/digsig_asymmetric.c | 4 +-
security/integrity/iint.c | 2 +-
security/integrity/ima/Kconfig | 16 ++-
security/integrity/ima/ima.h | 31 +++---
security/integrity/ima/ima_appraise.c | 16 ++-
security/integrity/ima/ima_fs.c | 13 +--
security/integrity/ima/ima_policy.c | 106 +++++++++-----------
security/integrity/ima/ima_queue.c | 2 +-
security/integrity/ima/ima_template.c | 124 ++++++++----------------
security/integrity/ima/ima_template_lib.c | 61 ++++++++++++
security/integrity/ima/ima_template_lib.h | 6 ++
security/integrity/integrity.h | 7 +-
15 files changed, 239 insertions(+), 184 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
next reply other threads:[~2017-06-21 20:02 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-06-21 20:02 Mimi Zohar [this message]
2017-06-22 2:59 ` [GIT PULL] IMA patches for 4.13 James Morris
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1498075333.3200.11.camel@linux.vnet.ibm.com \
--to=zohar@linux.vnet.ibm.com \
--cc=linux-security-module@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).